
Guru
Work experience
IT-Harvest
Chief Research Analyst
(
-
Present
)
saf ai Inc
Advisory Board Member
(
-
)
..see more
Quick Heal
Board Member
(
-
Present
)
Anitian
Member of Board of Directors
(
-
Present
)
Phosphorus Cybersecurity
Member of Advisory Board
(
-
Present
)
Areas of Expertise
About
United States
Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 4,070+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 32 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar. His research appears on Substack. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering from the University of Michigan, and his MA in War in the Modern World from King’s College, London. His latest book Security Yearbook 2025 was published by Wiley in April, 2025.
...see more
Analysts with similar expertise

Aparna Sundararajan
Strategic Advisor - Secure AI at Rain Consulting Services

Alejandro Leal
Senior Analyst at KuppingerCole Analysts

Evgeniy Kharam
Founder at EK Cyber and Media Consulting
Read Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation

Security
Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation
1 min
Read Thoropass: Innovating in the Audit Space

Security
Thoropass: Innovating in the Audit Space
1 min
Read Qwiet AI: The Intersection of AI and Application Security

Security
Qwiet AI: The Intersection of AI and Application Security
1 min
Read Zero Networks: The Problem with VPNs

Security
Zero Networks: The Problem with VPNs
1 min
Read Palo Alto Networks: The Role of Automation in Rapid Breach Response

Security
Palo Alto Networks: The Role of Automation in Rapid Breach Response
1 min
Read Thoropass: Fixing the Broken Audit Process

Security
Thoropass: Fixing the Broken Audit Process
1 min
Read Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation

Security
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
1 min
Read Savvy: SaaS Identity Discovery and Visibility

Data
Savvy: SaaS Identity Discovery and Visibility
1 min
Read Cyera: Why Data Defence is so Difficult in the TikTok Era

Security
Cyera: Why Data Defence is so Difficult in the TikTok Era
1 min
Read Cyera: How Generative AI is Driving Investments in Data Security

Security
Cyera: How Generative AI is Driving Investments in Data Security
1 min
Read Huntress: The Future of Cybersecurity Leadership

Security
Huntress: The Future of Cybersecurity Leadership
1 min
Read Cyera: Revolutionising Data Security for the Cloud Era

Security
Cyera: Revolutionising Data Security for the Cloud Era
1 min